Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
Briefly

Patchwork has initiated a spear-phishing campaign against Turkish defense contractors to collect strategic intelligence. This campaign features a five-stage execution process, wherein malicious LNK files appear as conference invitations. The operation specifically targeted a company known for precision-guided missile systems. The actions align with heightened defense collaborations between Pakistan and Türkiye amidst ongoing military tensions. Patchwork, recognized as a state-sponsored actor from India, has been active since 2009, previously targeting entities in China and South Asia, indicating an expanding operational footprint in its recent activities.
The threat actor known as Patchwork has launched a new spear-phishing campaign targeting Turkish defense contractors to gather strategic intelligence.
The campaign utilizes a five-stage execution chain with malicious LNK files disguised as invitations, focusing on unmanned vehicle systems.
This activity coincides with a period of increased defense cooperation between Pakistan and Türkiye and follows recent military skirmishes between India and Pakistan.
Patchwork, a state-sponsored actor of Indian origin active since at least 2009, has a history of targeting entities in China, Pakistan, and South Asia.
Read at The Hacker News
[
|
]